Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package openssl_tpm2_engine for 
openSUSE:Factory checked in at 2025-11-13 17:26:33
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/openssl_tpm2_engine (Old)
 and      /work/SRC/openSUSE:Factory/.openssl_tpm2_engine.new.2061 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "openssl_tpm2_engine"

Thu Nov 13 17:26:33 2025 rev:21 rq:1317414 version:4.4.3

Changes:
--------
--- /work/SRC/openSUSE:Factory/openssl_tpm2_engine/openssl_tpm2_engine.changes  
2025-03-01 19:16:47.093672698 +0100
+++ 
/work/SRC/openSUSE:Factory/.openssl_tpm2_engine.new.2061/openssl_tpm2_engine.changes
        2025-11-13 17:28:40.422431075 +0100
@@ -1,0 +2,7 @@
+Wed Nov 12 15:20:44 UTC 2025 - James Bottomley 
<[email protected]>
+
+- Update to version 4.4.3
+  * Fix openssl-3.0 build
+  * Fix tests for Ubuntu
+
+-------------------------------------------------------------------

Old:
----
  openssl_tpm2_engine-4.4.2.tar.gz

New:
----
  openssl_tpm2_engine-4.4.3.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ openssl_tpm2_engine.spec ++++++
--- /var/tmp/diff_new_pack.CD6mnT/_old  2025-11-13 17:28:42.226507649 +0100
+++ /var/tmp/diff_new_pack.CD6mnT/_new  2025-11-13 17:28:42.254508838 +0100
@@ -18,7 +18,7 @@
 
 
 Name:           openssl_tpm2_engine
-Version:        4.4.2
+Version:        4.4.3
 Release:        0
 Summary:        OpenSSL TPM 2.0 interface engine plugin
 License:        LGPL-2.1-only

++++++ openssl_tpm2_engine-4.4.2.tar.gz -> openssl_tpm2_engine-4.4.3.tar.gz 
++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/openssl_tpm2_engine-4.4.2/configure.ac 
new/openssl_tpm2_engine-4.4.3/configure.ac
--- old/openssl_tpm2_engine-4.4.2/configure.ac  2025-02-28 16:04:33.000000000 
+0100
+++ new/openssl_tpm2_engine-4.4.3/configure.ac  2025-11-12 16:16:09.000000000 
+0100
@@ -2,7 +2,7 @@
 # configure.in for the OpenSSL TPM engine project
 #
 
-AC_INIT(openssl-tpm2-engine, 4.4.2, <[email protected]>)
+AC_INIT(openssl-tpm2-engine, 4.4.3, <[email protected]>)
 AM_INIT_AUTOMAKE([foreign 1.6.3])
 AC_CANONICAL_HOST
 AM_CONDITIONAL(NATIVE_BUILD, test "x$cross_compiling" = "xno")
@@ -83,7 +83,12 @@
 fi
 
 if test "$ac_have_openssl3" = "1"; then
-    modulesdir=\"`$PKG_CONFIG --variable=modulesdir libcrypto`\"
+    modulesdir=`$PKG_CONFIG --variable=modulesdir libcrypto`
+    if test -z "$modulesdir"; then
+        buildprovider=0
+    else
+        buildprovider=1
+    fi
     AC_SUBST(modulesdir)
 fi
 
@@ -106,6 +111,7 @@
 AM_CONDITIONAL(HAVE_IBM_TSS, test "$tsslibs" = "IBM")
 
 AM_CONDITIONAL(HAVE_OPENSSL3, test "$ac_have_openssl3" = "1")
+AM_CONDITIONAL(BUILD_PROVIDER, test "$buildprovider" = "1")
 
 AC_DISABLE_STATIC
 AC_PROG_CC_STDC
@@ -163,6 +169,9 @@
     testtpm=
 fi
 
+AM_CONDITIONAL(HAVE_INTEL_SERVER, test -n "$testtpm" -a -z "$TPMSERVER")
+AM_CONDITIONAL(HAVE_IBM_SERVER, test -n "$testtpm" -a -n "$TPMSERVER")
+
 AC_SUBST(testtpm)
 
 AC_OUTPUT([Makefile
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/openssl_tpm2_engine-4.4.2/src/opensslmissing/signature.c 
new/openssl_tpm2_engine-4.4.3/src/opensslmissing/signature.c
--- old/openssl_tpm2_engine-4.4.2/src/opensslmissing/signature.c        
2025-02-28 16:04:33.000000000 +0100
+++ new/openssl_tpm2_engine-4.4.3/src/opensslmissing/signature.c        
2025-11-12 16:16:09.000000000 +0100
@@ -262,8 +262,10 @@
                        else if (strcmp(p->data, 
OSSL_PKEY_RSA_PSS_SALT_LEN_AUTO)
                                 == 0)
                                ctx->salt_len = RSA_PSS_SALTLEN_AUTO;
+#ifdef RSA_PSS_SALTLEN_AUTO_DIGEST_MAX
                        else if (strcmp(p->data, 
OSSL_PKEY_RSA_PSS_SALT_LEN_AUTO_DIGEST_MAX) == 0)
                                ctx->salt_len = RSA_PSS_SALTLEN_AUTO_DIGEST_MAX;
+#endif
                        else
                                ctx->salt_len = atoi(p->data);
                } else {
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/openssl_tpm2_engine-4.4.2/src/provider/Makefile.am 
new/openssl_tpm2_engine-4.4.3/src/provider/Makefile.am
--- old/openssl_tpm2_engine-4.4.2/src/provider/Makefile.am      2025-02-28 
16:04:33.000000000 +0100
+++ new/openssl_tpm2_engine-4.4.3/src/provider/Makefile.am      2025-11-12 
16:16:09.000000000 +0100
@@ -1,7 +1,7 @@
 AM_CPPFLAGS=-I../include
 COMMONLIB = ../libcommon/libcommon.a ../opensslmissing/libosslm.a
 
-if HAVE_OPENSSL3
+if BUILD_PROVIDER
 openssl_provider_LTLIBRARIES=libtpm2.la
 openssl_providerdir=@modulesdir@
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/openssl_tpm2_engine-4.4.2/tests/attestation.sh 
new/openssl_tpm2_engine-4.4.3/tests/attestation.sh
--- old/openssl_tpm2_engine-4.4.2/tests/attestation.sh  2025-02-28 
16:04:33.000000000 +0100
+++ new/openssl_tpm2_engine-4.4.3/tests/attestation.sh  2025-11-12 
16:16:09.000000000 +0100
@@ -1,5 +1,11 @@
 #!/bin/bash
 set -x
+##
+# The tss2 on Ubuntu is too old to contain tsscreateekcert which is
+# required for the attestation checks
+##
+which tsscreateekcert || exit 77
+
 
 ##
 # We already created eksign.name and null.name, so check them first
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/openssl_tpm2_engine-4.4.2/tests/check_counter_timer.sh 
new/openssl_tpm2_engine-4.4.3/tests/check_counter_timer.sh
--- old/openssl_tpm2_engine-4.4.2/tests/check_counter_timer.sh  2025-02-28 
16:04:33.000000000 +0100
+++ new/openssl_tpm2_engine-4.4.3/tests/check_counter_timer.sh  2025-11-12 
16:16:09.000000000 +0100
@@ -1,5 +1,13 @@
 #!/bin/bash
 
+##
+# The tss2 on Ubuntu is too old to recognize the -clock argument
+##
+if tssclockset|grep -qe -time; then
+    CLOCKARG=-time
+else
+    CLOCKARG=-clock
+fi
 
 ##
 # create a policy based on the tpm current clock the failing policy
@@ -38,7 +46,7 @@
 ##
 echo "Advance clock to expire key"
 clock=$[$clock+1000]
-tssclockset -hi o -clock ${clock} || exit 1
+tssclockset -hi o ${CLOCKARG} ${clock} || exit 1
 
 ##
 # now the signing operation should fail
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/openssl_tpm2_engine-4.4.2/tests/check_importable.sh 
new/openssl_tpm2_engine-4.4.3/tests/check_importable.sh
--- old/openssl_tpm2_engine-4.4.2/tests/check_importable.sh     2025-02-28 
16:04:33.000000000 +0100
+++ new/openssl_tpm2_engine-4.4.3/tests/check_importable.sh     2025-11-12 
16:16:09.000000000 +0100
@@ -1,9 +1,17 @@
 #!/bin/bash
-
+set -x
+##
+# The tss2 on Ubuntu is too old to allow variable size RSA keys
+##
+if tsscreateprimary -h | grep -qe '-rsa \[keybits\]'; then
+    RSAARG="-rsa 2048"
+else
+    RSAARG=-rsa
+fi
 
 # export the parent key as a EC and RSA public key
 ${bindir}/attest_tpm2_primary --certify owner --name ${testdir}/eksign.name 
--file srk.pub || exit 1
-prim=$(tsscreateprimary -rsa 2048 -hi o -opem srkrsa.pub | sed 's/Handle //') 
|| exit 1
+prim=$(tsscreateprimary ${RSAARG} -hi o -opem srkrsa.pub | sed 's/Handle //') 
|| exit 1
 tssflushcontext -ha ${prim} || exit 1
 
 for n in sha1 sha256 sha384; do
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/openssl_tpm2_engine-4.4.2/tests/check_rsa_oaep_pss.sh 
new/openssl_tpm2_engine-4.4.3/tests/check_rsa_oaep_pss.sh
--- old/openssl_tpm2_engine-4.4.2/tests/check_rsa_oaep_pss.sh   2025-02-28 
16:04:33.000000000 +0100
+++ new/openssl_tpm2_engine-4.4.3/tests/check_rsa_oaep_pss.sh   2025-11-12 
16:16:09.000000000 +0100
@@ -11,10 +11,13 @@
 # this PSS signature will be padded manually and done as an unpadded encrypt
 # by the TPM
 ##
-openssl sha256 -out tmp.md -binary tmp.txt || exit 1
-openssl pkeyutl -sign $ENGINE $KEYFORM -inkey key.tpm -pkeyopt 
rsa_padding_mode:pss -pkeyopt digest:sha256 -pkeyopt rsa_mgf1_md:sha256 -in 
tmp.md -out tmp.msg -passin pass:passw0rd || exit 1
-# OpenSSL bug in some versions returns false for correct signature
-openssl pkeyutl -verify -inkey key.pub -pubin -pkeyopt rsa_padding_mode:pss 
-pkeyopt digest:sha256 -pkeyopt rsa_mgf1_md:sha256 -in tmp.md -sigfile 
tmp.msg|grep 'Signature Verified Successfully'|| exit 1
+for salt in 20 -1 -2 -3; do
+    openssl sha256 -out tmp.md -binary tmp.txt || exit 1
+    openssl pkeyutl -sign $ENGINE $KEYFORM -inkey key.tpm -pkeyopt 
rsa_padding_mode:pss -pkeyopt digest:sha256 -pkeyopt rsa_mgf1_md:sha256 
-pkeyopt rsa_pss_saltlen:${salt} -in tmp.md -out tmp.msg -passin pass:passw0rd 
|| exit 1
+    # OpenSSL bug in some versions returns false for correct signature
+    openssl pkeyutl -verify -inkey key.pub -pubin -pkeyopt 
rsa_padding_mode:pss -pkeyopt digest:sha256 -pkeyopt rsa_mgf1_md:sha256 -in 
tmp.md -sigfile tmp.msg|grep 'Signature Verified Successfully'|| exit 1
+done
+
 ##
 # finally an OAEP encrypt which triggers an unpadded decrypt
 ##
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/openssl_tpm2_engine-4.4.2/tests/engine/Makefile.am 
new/openssl_tpm2_engine-4.4.3/tests/engine/Makefile.am
--- old/openssl_tpm2_engine-4.4.2/tests/engine/Makefile.am      2025-02-28 
16:04:33.000000000 +0100
+++ new/openssl_tpm2_engine-4.4.3/tests/engine/Makefile.am      2025-11-12 
16:16:09.000000000 +0100
@@ -44,15 +44,22 @@
        testdir=$(abs_srcdir)/..; export testdir; \
        TPM_NULL_NAME=${testdir}/null.name; \
        OPENSSL_CONF=$(abs_srcdir)/openssl.cnf; export OPENSSL_CONF; \
-       TPMSERVER=$(TPMSERVER); export TPMSERVER; \
        TSSTYPE=@TSSTYPE@; export TSSTYPE; \
-       SWTPM=$(SWTPM); export SWTPM; \
-       SWTPM_IOCTL=$(SWTPM_IOCTL); export SWTPM_IOCTL; \
        ENGINE="-engine tpm2"; export ENGINE; \
        INFORM="-inform engine"; export INFORM; \
        KEYFORM="-keyform engine"; export KEYFORM; \
        CAKEYFORM="-CAkeyform engine"; export CAKEYFORM;
 
+if HAVE_INTEL_SERVER
+AM_TESTS_ENVIRONMENT += \
+       SWTPM=$(SWTPM); export SWTPM; \
+       SWTPM_IOCTL=$(SWTPM_IOCTL); export SWTPM_IOCTL;
+endif
+if HAVE_IBM_SERVER
+AM_TESTS_ENVIRONMENT += \
+       TPMSERVER=$(TPMSERVER); export TPMSERVER;
+endif
+
 TEST_EXTENSIONS = .sh
 
 CLEANFILES = key*.tpm key*.pub key*.priv tmp.* NVChip h*.bin key*.der seal.* 
fifo tss2.* *.name
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/openssl_tpm2_engine-4.4.2/tests/fail_connect.sh 
new/openssl_tpm2_engine-4.4.3/tests/fail_connect.sh
--- old/openssl_tpm2_engine-4.4.2/tests/fail_connect.sh 2025-02-28 
16:04:33.000000000 +0100
+++ new/openssl_tpm2_engine-4.4.3/tests/fail_connect.sh 2025-11-12 
16:16:09.000000000 +0100
@@ -1,6 +1,12 @@
 #!/bin/bash
 set -x
 
+[ -f /etc/os-release ] && source /etc/os-release
+##
+# The version of Intel TSS on ubuntu crashes if no emulator is running
+##
+[ "$TSSTYPE" = "Intel" -a "$NAME" = "Ubuntu" ] && exit 77
+
 ##
 # test is
 # Start without any TPM socket listener and check the correct
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/openssl_tpm2_engine-4.4.2/tests/provider/Makefile.am 
new/openssl_tpm2_engine-4.4.3/tests/provider/Makefile.am
--- old/openssl_tpm2_engine-4.4.2/tests/provider/Makefile.am    2025-02-28 
16:04:33.000000000 +0100
+++ new/openssl_tpm2_engine-4.4.3/tests/provider/Makefile.am    2025-11-12 
16:16:09.000000000 +0100
@@ -1,4 +1,4 @@
-if HAVE_OPENSSL3
+if BUILD_PROVIDER
 
 TESTS = ../fail_connect.sh
 TESTS += ../start_sw_tpm.sh
@@ -44,15 +44,22 @@
        bindir=$(abs_srcdir)/../../src/tools; export bindir; \
        testdir=$(abs_srcdir)/..; export testdir; \
        OPENSSL_CONF=$(abs_srcdir)/openssl.cnf; export OPENSSL_CONF; \
-       TPMSERVER=$(TPMSERVER); export TPMSERVER; \
        TSSTYPE=@TSSTYPE@; export TSSTYPE; \
-       SWTPM=$(SWTPM); export SWTPM; \
-       SWTPM_IOCTL=$(SWTPM_IOCTL); export SWTPM_IOCTL; \
        ENGINE="-provider default -provider-path 
$(abs_srcdir)/../../src/provider/.libs -provider libtpm2"; export ENGINE; \
        INFORM=""; export INFORM; \
        KEYFORM=""; export KEYFORM; \
        CAKEYFORM=""; export CAKEYFORM;
 
+if HAVE_INTEL_SERVER
+AM_TESTS_ENVIRONMENT += \
+       SWTPM=$(SWTPM); export SWTPM; \
+       SWTPM_IOCTL=$(SWTPM_IOCTL); export SWTPM_IOCTL;
+endif
+if HAVE_IBM_SERVER
+AM_TESTS_ENVIRONMENT += \
+       TPMSERVER=$(TPMSERVER); export TPMSERVER;
+endif
+
 endif
 
 TEST_EXTENSIONS = .sh

Reply via email to